CYBERSECURITY – A COMPREHENSIVE APPROACH TO BALANCING RISKS & REWARDS

Ask your CIO or CISO if your company is winning the cybersecurity war, and the reply may not be the confident, positive affirmation the CEO or the Board of Directors wants to hear. Why? Information security professionals know the cybersecurity war cannot simply be “won”. Maintaining corporate cybersecurity posture is a constant battle. The identity of attacker(s), the nature of the attack(s) and the weapon(s) used constantly change. To be effective, corporate cybersecurity initiatives must address the variability of the threats, and evolve as the attacker(s) and their tactic(s) change. But, how can corporations implement a comprehensive cybersecurity initiative while striking a balance between the risks and rewards of the stakeholders? In this article, a corporate counterespionage and TSCM / Cyber TSCM expert addresses the need for a comprehensive approach to cybersecurity, with consideration of the risks and rewards of internal and external stakeholders.

Prior to starting ComSec LLC in 2007, Mr. LeaSure was active within the counterespionage, counterterrorism and TSCM fields for 26 years. He has attained the prestigious CCISM, Certified Counterespionage Information Security Management Certification. He also has extensive training, knowledge and experience in the identification of eavesdropping devices, espionage detection methods and the intelligence collection tactics most often employed by perpetrators of electronic espionage.

J.D. LeaSure is also the Director of the Espionage Research Institute International (ERII). As Director, he is tasked with ensuring the organization is successful in its mission to provide continuing education, facilitate professional relationship building and ensure the counterespionage & counterintelligence skill sets of its membership remains current as espionage tactics and devices evolve.